X-Con Spyware Destroyer

It includes Elevated threats that are typically installed without adequate notice and consent, and may make unwanted changes to our system, such as reconfiguring our browser’s homepage and search settings. These threats may install advertising-related add-ons, including toolbars and search bars, or insert advertising-related components into the Winsock Layered Service Provider chain. These new add-ons and components may block or redirect our preferred network connections, and can negatively impact our computer’s performance and stability. Elevated threats may also collect, transmit, and share potentially sensitive data without adequate notice and consent.0

General information:

Malware Name: X-Con Spyware Destroyer
Malware Type: Adware
Company Name: X-Con Spyware Destroyer
Company URL: http://x-conspywaredestroyer.com/
Threat Level: Elevated Risk
Operating System: WIN XP
Installation Type: Installed through EXE
Operation: Time of After Installation.

Company Description:

The only anti-spyware product in the market with Freeze Scan Technology. Developed by the creators of X-Con Spyware Destroyer, the freezer scan stop malware in its tracks by freezing our system before a full scan. The X-Con Spyware Destroyer is a complete Anti-Spyware program. It provides full registry, folder and file scan. It also contains the feature of regular update.

Spyware Description:

It includes Elevated threats that are typically installed without adequate notice and consent, and may make unwanted changes to our system, such as reconfiguring our browser’s homepage and search settings. These threats may install advertising-related add-ons, including toolbars and search bars, or insert advertising-related components into the Winsock Layered Service Provider chain. These new add-ons and components may block or redirect our preferred network connections, and can negatively impact our computer’s performance and stability. Elevated threats may also collect, transmit, and share potentially sensitive data without adequate notice and consent.0

Characteristics/Symptoms:

    -> False positives work as good to purchase -> False scan results -> Uses inadequate scan/detection scheme -> Uses out of date ref database0

Additional information might be found here:

google Search at Google for X-Con Spyware Destroyer
bing Search at Bing for X-Con Spyware Destroyer
yahoo Search at Yahoo for X-Con Spyware Destroyer

Processes Running:

X-Con Spyware Destroyer.exe

File information Created after Installation:

File Location Size (Bytes) Type
C:\Documents and Settings\[USER]\Desktop\X-Con Spyware Destroyer.lnk 1656 Shortcut
C:\Program Files\X-Con Spyware Destroyer\License.txt 4351 Text Document
C:\Program Files\X-Con Spyware Destroyer\image.ico 3774 Icon

Folder information Created after Installation:

Folder Location

Registry information Created after Installation:

Main Registry Key Sub Registry Key Key Value Name
HKEY_LOCAL_MACHINE \SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\X-Con Spyware Destroyer Suite UninstallString